CN109861999B - Data transmission control method, device and storage medium - Google Patents
Data transmission control method, device and storage medium Download PDFInfo
- Publication number
- CN109861999B CN109861999B CN201910055906.6A CN201910055906A CN109861999B CN 109861999 B CN109861999 B CN 109861999B CN 201910055906 A CN201910055906 A CN 201910055906A CN 109861999 B CN109861999 B CN 109861999B
- Authority
- CN
- China
- Prior art keywords
- terminal
- target data
- password information
- sent
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a control method of data transmission, which comprises the following steps: the first terminal sends target data to the second terminal through a user datagram protocol; when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again; and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal. The invention also discloses a control device for data transmission and a computer readable storage medium. The invention improves the reliability of the data transmitted based on the UDP protocol.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data transmission control method, a data transmission control device, and a computer-readable storage medium.
Background
The udp (user Datagram protocol) protocol is a user Datagram protocol, is used for processing data packets in a network like a TCP protocol, is a connectionless protocol, belongs to a connectionless transport layer protocol in an OSI (Open System Interconnection) reference model, and provides a transaction-oriented simple unreliable information transfer service.
Because the UDP protocol has the disadvantages of not providing packet grouping and assembling and not being able to sequence packets, when a sending end sends data based on UDP transmission, a receiving end may not receive data due to packet loss, and even if the receiving end receives data, it is difficult to determine whether the data is true or false.
Disclosure of Invention
The main object of the present invention is to provide a method for controlling data transmission, a device for controlling data transmission, and a computer-readable storage medium, which improve the reliability of data transmitted based on the UDP protocol.
In order to achieve the above object, the present invention provides a method for controlling data transmission, including the following steps:
the first terminal sends target data to the second terminal through a user datagram protocol;
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again;
and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal.
Preferably, when the response information corresponding to the target data and sent by the second terminal is not received within the preset time period, the step of resending the target data to the second terminal includes:
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, acquiring the number of times of sending the target data to the second terminal;
and when the number of times of sending the target data to the second terminal is less than a preset number of times, sending the target data to the second terminal again.
Preferably, the target data includes a control instruction, and the control instruction is used for controlling the second terminal to operate.
Preferably, the method for controlling data transmission includes the following steps:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, sending response information and password information corresponding to the target data to the first terminal;
receiving password information sent by the first terminal based on the password information;
and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data.
Preferably, after the step of sending, by the second terminal, response information and password information corresponding to the target data to the first terminal when the second terminal receives the target data sent by the first terminal through the user datagram protocol, the method further includes:
and when the password information sent by the first terminal based on the password information is not received within a preset time length, the password information is sent to the first terminal again.
Preferably, when the second terminal receives target data sent by the first terminal through a user datagram protocol, the step of sending response information and password information corresponding to the target data to the first terminal includes:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, generating response information and password information corresponding to the target data;
and sending the response information and the password information to the first terminal.
Preferably, the step of processing the target data comprises:
and acquiring a control instruction in the target data, and executing the control instruction.
In order to achieve the above object, the present invention further provides a control device for data transmission, including:
the data transmission control device comprises a memory, a processor and a data transmission control program which is stored on the memory and can run on the processor, and the data transmission control program realizes the steps of the data transmission control method when being executed by the processor.
To achieve the above object, the present invention further provides a computer-readable storage medium having stored thereon a control program for data transmission, which when executed by a processor implements the steps of the control method for data transmission as described above.
According to the data transmission control method, the data transmission control device and the computer readable storage medium, the first terminal sends target data to the second terminal through a user datagram protocol; when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again; and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal. Thus, the reliability of the data transmitted based on the UDP protocol is improved.
Drawings
Fig. 1 is a schematic diagram of a hardware operating environment of a terminal according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a method for controlling data transmission according to the present invention;
fig. 3 is a flowchart illustrating a control method for data transmission according to a second embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a control method for data transmission, which improves the reliability of data transmitted based on a UDP protocol.
As shown in fig. 1, fig. 1 is a schematic diagram of a hardware operating environment of a terminal according to an embodiment of the present invention;
the terminal in the embodiment of the invention can be a control device for data transmission.
As shown in fig. 1, the terminal may include: a processor 1001, such as a Central Processing Unit (CPU), a memory 1002, and a communication bus 1003. The communication bus 1003 is used for implementing connection communication between the components in the terminal. The memory 1002 may be a random-access memory (RAM-random-access memory) or a non-volatile memory (non-volatile memory), such as a disk memory. The memory 1002 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration of the terminal shown in fig. 1 is not intended to be limiting of the terminal of embodiments of the present invention and may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1002, which is a kind of computer storage medium, may include therein a control program for data transmission.
In the terminal shown in fig. 1, the processor 1001 may be configured to call up a control program for data transmission stored in the memory 1002, and perform the following operations:
the first terminal sends target data to the second terminal through a user datagram protocol;
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again;
and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, acquiring the number of times of sending the target data to the second terminal;
and when the number of times of sending the target data to the second terminal is less than a preset number of times, sending the target data to the second terminal again.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
the target data comprises a control instruction, and the control instruction is used for controlling the second terminal to operate.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, sending response information and password information corresponding to the target data to the first terminal;
receiving password information sent by the first terminal based on the password information;
and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
and when the password information sent by the first terminal based on the password information is not received within a preset time length, the password information is sent to the first terminal again.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, generating response information and password information corresponding to the target data;
and sending the response information and the password information to the first terminal.
Further, the processor 1001 may call a control program for data transfer stored in the memory 1002, and also perform the following operations:
and acquiring a control instruction in the target data, and executing the control instruction.
Referring to fig. 2, in an embodiment, the method for controlling data transmission includes:
and step S10, the first terminal sends the target data to the second terminal through the user datagram protocol.
In this embodiment, the terminal in this embodiment is a first terminal, and the first terminal may be a control device for data transmission, such as a mobile phone, a tablet, a computer, and the like. In addition, the second terminal may be a control device for data transmission, such as a mobile phone, a tablet device, a computer, or a home appliance.
The first terminal is a sending end for UDP (user Datagram protocol) transmission, and the second terminal is a receiving end for UDP transmission, that is, the first terminal may send data to the second terminal through a UDP protocol.
Alternatively, the target data may be data transmitted by the first terminal to the second terminal through a user datagram protocol. Wherein the target data may include a control instruction for controlling the operation of the second terminal.
Specifically, the first terminal sends the target data to the second terminal in the form of a UDP packet through a UDP protocol.
Step S20, when the response information corresponding to the target data sent by the second terminal is not received within the preset time, resending the target data to the second terminal.
After the first terminal sends the target data to the second terminal through the UDP protocol, the second terminal needs to return a response message corresponding to the target data to the first terminal to inform the first terminal that the target data has been received. And if the first terminal does not receive the response information which is sent by the second terminal and corresponds to the target data within the preset time length, the first terminal sends the target data to the second terminal again through the UDP protocol.
It should be noted that the preset time may be in a range of 1 second to 10 seconds, and preferably 2 seconds, 3 seconds, or 5 seconds.
Therefore, the problem that data transmission between the first terminal and the second terminal cannot be continued due to data packet loss during UDP transmission can be avoided, and the reliability of data transmitted based on the UDP protocol is improved.
Specifically, when the first terminal does not receive response information corresponding to the target data sent by the second terminal within a preset time length, the number of times of sending the target data to the second terminal, that is, the number of times of sending the target data is obtained, and when the number of times of sending the target data is smaller than the preset number of times, the first terminal sends the target data to the second terminal again; and when the sending times of the target data are larger than or equal to the preset times, the first terminal stops sending the target data to the second terminal, namely the first terminal does not send the target data any more.
Therefore, the situation that when the second terminal cannot receive the target data and does not return the response information to the first terminal due to poor network environment and the first terminal continues to repeatedly send the target data because the response information is not received is avoided, and resource waste is caused.
Of course, when the first terminal receives the response information corresponding to the target data returned by the second terminal, the first terminal stops sending the same target data to the second terminal.
Step S30, when receiving password information corresponding to the target data sent by the second terminal, sending password information corresponding to the password information to the second terminal, so that the second terminal can verify the first terminal.
After the second terminal receives the target data sent by the first terminal, the second terminal returns response information to the first terminal to enable the first terminal to stop sending the same target data, and sends password information of the target data to the first terminal to verify the first terminal, so that whether the received target data is credible or not is determined.
It should be noted that the password information is dynamic password information, which may be a same key mechanism built in the first terminal and the second terminal in advance, and the second terminal may dynamically generate the password information after receiving the target data, or randomly generate a password information, and then associate the password information with the target data. It should be appreciated that the password information generated by the second terminal at a time may be the same or different, and thus the risk of the second terminal receiving illegal data may be reduced.
Specifically, after the first terminal receives the password information sent by the second terminal, the password information corresponding to the password information is generated according to the password information, and the password information is sent to the second terminal in a UDP transmission mode.
After the second terminal receives the password information of the first terminal, whether the password information corresponds to the password information or not is detected, and when the password information corresponds to the password information, the verification is judged to be passed; if the password information does not correspond to the password information, the authentication is determined not to be passed.
Optionally, the target data may include a control instruction for controlling the operation of the second terminal. When the first terminal passes the verification, the first terminal is judged to have the control authority, and the second terminal can acquire the control command in the target data and execute the control command.
When the first terminal is not authenticated, the second terminal may not process the target data or may erase the target data.
Therefore, a password authentication mechanism is introduced into interaction between the first terminal and the second terminal based on UDP transmission, and authenticity of data received by the second terminal is ensured by authenticating the authority of the first terminal, so that reliability of data transmitted based on the UDP protocol is improved.
In one embodiment, a first terminal sends target data to a second terminal through a user datagram protocol; when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again; and when password information corresponding to the target data and sent by the second terminal is received, sending the password information corresponding to the password information to the second terminal so that the second terminal can verify the first terminal. Thus, the reliability of the data transmitted based on the UDP protocol is improved.
In a second embodiment, as shown in fig. 3, based on the above embodiment shown in fig. 2, the method for controlling data transmission includes the following steps:
and step S40, when the second terminal receives the target data sent by the first terminal through the user datagram protocol, sending response information and password information corresponding to the target data to the first terminal.
And step S50, receiving password information sent by the first terminal based on the password information.
And step S60, when it is detected that the password information corresponds to the password information, determining that the first terminal passes the authentication, and processing the target data.
In this embodiment, the terminal in this embodiment is a second terminal, and the first terminal may be a control device for data transmission, such as a mobile phone, a tablet, a computer, and the like. In addition, the second terminal may be a control device for data transmission, such as a mobile phone, a tablet device, a computer, or a home appliance.
The first terminal may send data to the second terminal via the UDP protocol, and accordingly, the second terminal may also send data to the first terminal via the UDP protocol.
Alternatively, the target data may be data transmitted by the first terminal to the second terminal through a user datagram protocol. Wherein the target data may include a control instruction for controlling the operation of the second terminal. The first terminal may send the target data to the second terminal in the form of UDP packets via the UDP protocol.
After the first terminal sends the target data to the second terminal through the UDP protocol, the second terminal needs to return a response message corresponding to the target data to the first terminal to inform the first terminal that the target data has been received.
Specifically, when the second terminal receives target data sent by the first terminal through the UDP protocol, the second terminal may generate corresponding response information according to the received target data, where the response information is used to inform that the first terminal has received the target data, so that the first terminal stops sending the same target data. Meanwhile, the second terminal can also generate dynamic password information in real time and correlate the password information with the received target data.
It should be noted that, when the second terminal receives different target data sent by the first terminal at the same time, the corresponding response information and password information may still be generated for each target data.
The second terminal can send the response information to the first terminal through a UDP protocol when generating the response information corresponding to the target data, and the second terminal can send the password information to the first terminal through the UDP protocol when generating the password information corresponding to the target data so as to verify the first terminal and further determine whether the received target data is credible.
Optionally, if the second terminal receives the same target data sent by the first terminal after sending the response message to the first terminal, indicating that the first terminal does not receive the response message, the second terminal may send the response message again. Therefore, the situation that the first terminal continues to repeatedly send the target data because the first terminal does not receive the response information due to poor network environment and resource waste is caused is avoided.
When the second terminal does not receive the password information sent by the first terminal based on the password information within the preset time length, the second terminal indicates that the first terminal receives the password information, and therefore the second terminal can send the password information to the first terminal again. It should be noted that the preset time may be in a range of 1 second to 10 seconds, and preferably 2 seconds, 3 seconds, or 5 seconds.
After the second terminal receives the password information of the first terminal, whether the password information corresponds to the password information or not is detected, and when the password information corresponds to the password information, the verification is judged to be passed; if the password information does not correspond to the password information, the authentication is determined not to be passed.
Optionally, the target data may include a control instruction for controlling the operation of the second terminal. When the first terminal passes the verification, the first terminal is judged to have the control authority, and the second terminal can acquire the control command in the target data and execute the control command.
For example, the first terminal may be a mobile phone, the second terminal may be a lighting device, the first terminal may transmit a lighting instruction to the second terminal through a UDP protocol, after the second terminal receives the lighting instruction transmitted based on the UDP protocol, the second terminal returns response information and password information to the first terminal, and when the password information is verified, the second terminal executes the lighting instruction, that is, the lighting device performs a lighting operation.
When the first terminal is not authenticated, the second terminal may not process the target data or may erase the target data.
The UDP protocol is a connectionless transport layer protocol, and the user may conveniently control a corresponding electronic device (the second terminal) by sending a control instruction to the second terminal through the first terminal by using the UDP protocol.
In one embodiment, when a second terminal receives target data sent by a first terminal through a user datagram protocol, response information and password information corresponding to the target data are sent to the first terminal; receiving password information sent by the first terminal based on the password information; and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data. Thus, the reliability of the data transmitted based on the UDP protocol is improved.
In addition, the present invention also provides a control device for data transmission, where the control device for data transmission includes a memory, a processor, and a control program for data transmission stored in the memory and executable on the processor, and the processor implements the steps of the control method for data transmission according to the above embodiment when executing the control program for data transmission.
Furthermore, the present invention also proposes a computer-readable storage medium including a control program for data transmission, which when executed by a processor implements the steps of the control method for data transmission as described in the above embodiment.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a television, a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (9)
1. A method for controlling data transmission, the method comprising:
the first terminal sends target data to the second terminal through a user datagram protocol;
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, the target data is sent to the second terminal again;
when password information corresponding to the target data and sent by the second terminal is received, password information is generated according to the password information, and the password information corresponding to the password information is sent to the second terminal so that the second terminal can verify the first terminal, wherein the password information sent each time is different.
2. The method according to claim 1, wherein the step of retransmitting the target data to the second terminal when the response message corresponding to the target data sent by the second terminal is not received within a preset time period comprises:
when response information corresponding to the target data and sent by the second terminal is not received within a preset time length, acquiring the number of times of sending the target data to the first terminal;
and when the number of times of sending the target data to the second terminal is less than a preset number of times, sending the target data to the second terminal again.
3. The method according to claim 1 or 2, wherein the target data includes a control instruction for controlling the operation of the second terminal.
4. A method for controlling data transmission, the method comprising:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, sending response information and password information corresponding to the target data to the first terminal, wherein the password information sent each time is different;
receiving password information sent by the first terminal based on the password information, wherein the first terminal generates the password information according to the password information;
and when detecting that the password information corresponds to the password information, judging that the first terminal passes the verification, and processing the target data.
5. The method for controlling data transmission according to claim 4, wherein after the step of sending response information and password information corresponding to the target data to the first terminal when the second terminal receives the target data sent by the first terminal through the user datagram protocol, the method further comprises:
and when the password information sent by the first terminal based on the password information is not received within a preset time length, the password information is sent to the first terminal again.
6. The method for controlling data transmission according to claim 4, wherein the step of sending response information and password information corresponding to the target data to the first terminal when the second terminal receives the target data sent by the first terminal through the user datagram protocol comprises:
when a second terminal receives target data sent by a first terminal through a user datagram protocol, generating response information and password information corresponding to the target data;
and sending the response information and the password information to the first terminal.
7. The method for controlling data transmission according to claim 4, wherein the step of processing the target data includes:
and acquiring a control instruction in the target data, and executing the control instruction.
8. A data transfer control apparatus comprising a memory, a processor, and a data transfer control program stored in the memory and executable on the processor, wherein the data transfer control program, when executed by the processor, implements the steps of the data transfer control method according to any one of claims 1 to 7.
9. A computer-readable storage medium, characterized in that a control program of data transmission is stored on the computer-readable storage medium, which when executed by a processor implements the steps of the control method of data transmission according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910055906.6A CN109861999B (en) | 2019-01-21 | 2019-01-21 | Data transmission control method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910055906.6A CN109861999B (en) | 2019-01-21 | 2019-01-21 | Data transmission control method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109861999A CN109861999A (en) | 2019-06-07 |
CN109861999B true CN109861999B (en) | 2022-04-26 |
Family
ID=66895511
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910055906.6A Active CN109861999B (en) | 2019-01-21 | 2019-01-21 | Data transmission control method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109861999B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110647071B (en) * | 2019-09-05 | 2021-08-27 | 华为技术有限公司 | Method, device and storage medium for controlling data transmission |
CN112217610B (en) * | 2020-09-18 | 2023-03-14 | 广州市贺氏办公设备有限公司 | Data processing method and device, consumer machine, terminal and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101699797A (en) * | 2009-11-13 | 2010-04-28 | 珠海网博信息科技有限公司 | Method for performing data transmission by using UDP protocol |
CN102752311A (en) * | 2012-07-16 | 2012-10-24 | 天地融科技股份有限公司 | Authentication method, system and device |
CN102916968A (en) * | 2012-10-29 | 2013-02-06 | 北京天诚盛业科技有限公司 | Identity authentication method, identity authentication server and identity authentication device |
CN103685103A (en) * | 2013-11-26 | 2014-03-26 | 广州市花都区中山大学国光电子与通信研究院 | Integral verification platform based on FPGA communication base bands |
CN105792269A (en) * | 2016-02-25 | 2016-07-20 | 深圳市共进电子股份有限公司 | Remote operation and maintenance management method and device based on UDP (User Datagram Protocol) connection |
CN107608224A (en) * | 2017-09-18 | 2018-01-19 | 广东美的制冷设备有限公司 | Control method, device and the computer-readable recording medium of household electrical appliances |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015161693A1 (en) * | 2014-04-25 | 2015-10-29 | 天地融科技股份有限公司 | Secure data interaction method and system |
CN107707439A (en) * | 2017-09-29 | 2018-02-16 | 深圳市艾特智能科技有限公司 | Control method, system, storage medium and the computer equipment of intelligent home device |
-
2019
- 2019-01-21 CN CN201910055906.6A patent/CN109861999B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101699797A (en) * | 2009-11-13 | 2010-04-28 | 珠海网博信息科技有限公司 | Method for performing data transmission by using UDP protocol |
CN102752311A (en) * | 2012-07-16 | 2012-10-24 | 天地融科技股份有限公司 | Authentication method, system and device |
CN102916968A (en) * | 2012-10-29 | 2013-02-06 | 北京天诚盛业科技有限公司 | Identity authentication method, identity authentication server and identity authentication device |
CN103685103A (en) * | 2013-11-26 | 2014-03-26 | 广州市花都区中山大学国光电子与通信研究院 | Integral verification platform based on FPGA communication base bands |
CN105792269A (en) * | 2016-02-25 | 2016-07-20 | 深圳市共进电子股份有限公司 | Remote operation and maintenance management method and device based on UDP (User Datagram Protocol) connection |
CN107608224A (en) * | 2017-09-18 | 2018-01-19 | 广东美的制冷设备有限公司 | Control method, device and the computer-readable recording medium of household electrical appliances |
Also Published As
Publication number | Publication date |
---|---|
CN109861999A (en) | 2019-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109246053B (en) | Data communication method, device, equipment and storage medium | |
EP3013086B1 (en) | Method, apparatus and electronic device for connection management | |
CN109309685B (en) | Information transmission method and device | |
CN107241336B (en) | Identity verification method and device | |
EP3319267A1 (en) | Wireless system access control method and device | |
CN109474595B (en) | Electronic equipment binding method, electronic equipment, mobile terminal and server | |
CN111131300B (en) | Communication method, terminal and server | |
CN106559405B (en) | Portal authentication method and equipment | |
EP3320423A1 (en) | Authentication method, apparatus, and system | |
CN109996219B (en) | Internet of things authentication method, network equipment and terminal | |
CN109861999B (en) | Data transmission control method, device and storage medium | |
EP2981022A1 (en) | Method and system for transmitting and receiving data, method and device for processing message | |
CN100388260C (en) | Software defined radio download | |
CN111404695A (en) | Token request verification method and device | |
WO2023109240A1 (en) | Smart door lock binding method and apparatus, storage medium and electronic device | |
CN107508746B (en) | Good friend's adding method, device and electronic equipment | |
EP2557755B1 (en) | Securely Performing Commands from a Remote Source | |
CN112448930A (en) | Account registration method, device, server and computer readable storage medium | |
CN110430572B (en) | eUICC card, communication method of eUICC card and management platform and communication system thereof | |
CN109286665B (en) | Real-time mobile game long link processing method and device | |
CN105553675B (en) | Log in the method and device of router | |
EP3313039A1 (en) | Home gateway, communication management method and communication system thereof | |
CN111918268B (en) | Control method and device of intelligent equipment, electronic equipment and storage medium | |
CN110830420A (en) | Method and system for verifying short message verification code | |
CN112469035B (en) | Safe activation and control method and communication system of remote equipment of Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |